E-Zine: Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing
By: IBM View more from IBM >>
Download this next:
Integration Testing: Tips and Best Practices
By: TechTarget Business Analytics
Type: eGuide
If you practice agile development, you're probably familiar with integration testing. But did you know that the term “integration test” means different things to different people?
In this expert e-guide, explore the various meanings of integration testing and learn how each fits into the application development lifecycle. Also, get tips and best practices from the pros about integration testing, as well as advice for overcoming some of the most common integration testing challenges facing developers today.
These are also closely related to: "E-Zine: Software Testing Vol.3: This Issue of Software Testing Delves Into Mobile Application and Regression Testing"
-
Continuous testing: How a bank boosted software quality
By: Digital.ai
Type: Case Study
A leading bank was primarily practicing manual testing for its software delivery efforts, which lacked standardization and led to inconsistencies across locations. What’s more, their manual solution lacked traceability, making it difficult to maintain compliance.
To alleviate these problems and enhance software quality, the bank decided to integrate continuous testing into its DevOps practices, thereby enabling the consistent delivery of high-quality software for their entire user community. Read on to understand how automating software delivery workflows can empower your business.
-
QA automation: Consistently deliver high-quality software
By: Growth Acceleration Partners
Type: eBook
When you need to deliver reliable, high-quality software that meets the needs of both your businesses and end-users, quality assurance (QA) is a step you can’t afford to skimp on.
Indeed, QA services and software testing solutions are crucial aspects of the software development lifecycle. A focus on this specialized process ensures software meets specified requirements, functions correctly, and delivers a positive user experience.
In this e-book, you’ll discover how you can empower your in-house developers to ship high-quality software that scales with your business and your customers’ needs. Read on to understand why QA automation testing is key.
Find more content like what you just read:
-
AWS Differences between Active and Passive IAST and how to get the best of both worlds
By: Contrast Security
Type: White Paper
Interactive Application Security Testing (IAST) is a relatively new technology that has caused a lot of confusion for not being clearly explained. This article sets out to clear the air. It will explain:What is IAST?What’s the difference between Active IAST & Passive IAST? Which approach is better for you?Access the paper here.
-
ALM: Taking a middleware-focused approach
By: GigaSpaces Technologies Inc.
Type: eGuide
In this expert e-guide, Tom Nolle discusses how to take a middleware-focused approach to app lifecycle management practices. Uncover helpful advice for selecting middleware tools and managing OS and middleware platforms in the cloud. Plus, learn about the critical relationship between ALM, DevOps, and orchestration.
-
Creating a SOA Integration Strategy
By: TechTarget Business Analytics
Type: eGuide
This expert e-guide explores the benefits of middleware integration and why they've become so popular for today's IT environments. Also, get an in-depth look at three real-life SOA integration projects and how they succeed in connecting applications and processes.
-
The Many Faces of Software Testing
By: TechTarget Security
Type: eGuide
Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.
-
Why you should have a disaster recovery testing plan in place
By: TechTarget ComputerWeekly.com
Type: eGuide
With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.
-
Application security testing: Protecting your application and data
By: TechTarget Security
Type: eBook
Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of application security and then delves deeper into common vulnerabilities and performance concerns.
-
E-Guide: Best practices for pen testing Web applications
By: TechTarget Security
Type: eGuide
This expert E-Guide examines what a Web application test is and best practices to getting the most out of them. Uncover guidelines to ensure your pen test is a success and key recommendations on how you can avoid common pitfalls.
-
-
E-Guide: Expert insights to application security testing and performance
By: TechTarget Security
Type: eGuide
Two of the biggest challenges in an organization’s application security strategies are testing and integrating best practices within the application lifecycle. In this E-Guide, readers will learn best practices for testing injection integrating security measures into the application lifecycle.
-
-
E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
By: TechTarget Data Center
Type: eBook
This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
-
-
-
How Does Penetration Testing Work?
By: Novacoast
Type: Product Overview
In the increasingly challenging cyber threat landscape, you must identify and remedy any security weaknesses in order to protect your business. Penetration testing can help you on your path to a stronger security posture. Learn about the seven components of a penetration testing service in this overview.
-
Test-integrated module publishing 101: What to know
By: Microsoft + HashiCorp
Type: Product Demo
Today, developers are looking for new, easy-to-use tools to perform unit and integration testing of code. However, to benefit from high-quality modules, companies must also have an effective way of publishing them systematically. Tune into this video to learn more.
-
Penetration testing: Different types & how it works
By: Bitdefender
Type: White Paper
Many organizations that invested in web and mobile applications over the past few years were uneducated in the potential threats and failed to protect their end users from encountering availability and performance issues. Download this white paper to learn how it works and explore the different types of penetration testing.
-
How to expand app security testing coverage without slowing development
By: HCL Software
Type: Case Study
Discover in this case study how HCL Tech is helping organizations implement Interactive Application Security Testing solutions, which can help businesses expand and improve security testing without slowing down application software development.
-
The key to testing & troubleshooting agent processes
By: Cyara
Type: Case Study
When this cloud-based contact center solution provider became concerned about the consistent quality and efficacy of their technology, they sought out a way that they could test and troubleshoot their processes and potential issues for agents. Access the case study to hear the full story.
-
The key role of IAST for security testing
By: Contrast Security
Type: Blog
In the age of observability, Interactive Application Security Testing (IAST) has emerged as an essential security testing strategy. This resource examines how IAST helps observability of multiplying, complex apps, as well as the crucial role it plays in an effective security strategy.
-
Step by Step: Best practices for security patch management
By: TechTarget Security
Type: eGuide
Whether you're new to patch management or just need a refresher, this expert e-guide reviews best practices for security patch management to ensure accurate, effective patch testing in your organization.
-
Next-generation DAST: Introducing interactive application security testing (IAST)
By: Contrast Security
Type: White Paper
While dynamic application security testing (DAST) has been a go-to AppSec testing technique for decades, it is not without its drawbacks. This is where interactive application security testing (IAST) comes into play, building off of DAST, but analyzing apps from the inside out, rather than from the outside in. Read this white paper to learn more.
-
4 stages of your end-to-end voice testing lifecycle
By: Hammer
Type: eBook
For many organizations who are struggling with their voice and contact center tech, end-to-end testing may be the right solution for their needs. However, due to a handful of challenges during its lifecycle stages, some can be daunted by the process and can be unsure of where to start. Browse this guide to learn more.
-
Prevent Application Meltdown with VDI Testing
By: OnX USA LLC
Type: eGuide
This E-Guide from SearchNetworking.com highlights important techniques you should use when quantifying VDI network performance.
-
AI-based application testing: Simulate attacks at scale
By: Veracode
Type: White Paper
With advances in AI capabilities, hackers have leveraged the evolving technology in order to perform more sophisticated attacks at scale. If actual attacks are using AI, then simulated attack testing that is performed at scale using AI is as close of a simulation to the real thing as one could hope for. Read on to learn more.
-
Infographic: 10-step guide for testing backups
By: TechTarget ComputerWeekly.com
Type: Infographic
Creating and adopting a data backup plan is only the first step to protect enterprises against the possibility of a system failure. To achieve complete data protection, it is also necessary to establish a backup testing strategy. Here are ten recommendations to ensure that your organization's data will always be safe, secure and rapidly available.
-
Automated chatbot testing: Is it worth it?
By: Cyara
Type: Product Overview
As organizations continue to integrate chatbots and other AI tools into their contact centers, it’s critical to ensure that they’re working efficiently and effectively 24/7. However, keeping up with these solutions at all hours of the day isn’t easy. That’s where automated testing and monitoring comes in. Browse this guide to learn more.
-
Expert Steps for Testing DR Effectiveness
By: TechTarget Storage
Type: eGuide
This E-Guide outlines three key phases of DR performance evaluation and provides two examples of how conducting a business impact analysis can minimize the effects of a disruption.
-
Penetration testing; Find vulnerabilities before hackers can
By: Bitdefender
Type: Product Overview
Every new technology introduced to your organization adds further complexity to the attack surface. Bitdefender offers customized Red Team Exercises that simulate real-life threat actors to identify vulnerabilities so that your security teams can resolve them before real hackers can exploit them. Read on to learn more.
-
CW Innovation Awards: NUHS taps RPA in Covid-19 swab tests
By: TechTarget ComputerWeekly.com
Type: eGuide
In this case study, learn how Singapore's National University Health System deployed RPA bots to automate patient registration during Covid-19 swab tests as part of broader efforts to improve efficiency.
-
Application Security Handbook: Application Security: Managing Software Threats
By: TechTarget Security
Type: eBook
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'.
-
IDC TechBrief: Interactive Application Security Testing
By: Contrast Security
Type: White Paper
With modern application development operating at break-neck speeds, DevOps teams pressured by deadlines are often forced to compromise security for efficiency’s sake. This white paper examines the benefits of using interactive application security testing to mitigate the security risk and complexities of using DevSecOps. Read on to learn more.
-
What IT leaders are saying about application security testing trends
By: HCL Software
Type: Blog
Take a look at key highlights from HCLSoftware’s application security testing survey in this blog post, including how industry leaders are reducing the risks that come with the massive sharing of data over the web.
-
Royal Holloway: Testing antivirus efficacy in Linux
By: TechTarget ComputerWeekly.com
Type: Ezine
Antivirus software plays an important part in protecting users and networks from malware, so installing and keeping it up-to-date is essential in securing computing devices. Yet Linux users believe this OS can only be marginally affected by malicious software. In this Royal Holloway article, we evaluate the effectiveness of some antivirus products.
-
DR for SMBs in 2013: Best practices for testing & planning
By: TechTarget Storage
Type: eGuide
Check out this expert E-Guide to explore the keys to a successful DR strategy, and learn why it's essential that you document and test your plan once it's implemented.
-
NLMK's Industrial Cybersecurity Test Succeeds at Steel Site
By: Kaspersky
Type: Case Study
NLMK has protected its industrial control systems from cyberattack by deploying Kaspersky Industrial CyberSecurity in its electrical steel shop. The solution secured NLMK's infrastructure without impacting operations. Read the case study to learn how Kaspersky Industrial CyberSecurity can protect your industrial networks.
-
Bitdefender Pen Testing: 6 benefits for web, mobile, & networks
By: Bitdefender
Type: Product Overview
Bitdefender Offensive Services go beyond vulnerability assessment by identifying key security weaknesses so they can be remediated, in addition to customized Penetration (Pen) Testing. Find out how your company could benefit from employing Bitdefender Offensive Services by downloading this solution overview
-
E-Guide: VM in the Cloud
By: TechTarget Security
Type: eGuide
Before you move services to the cloud, you must understand how the change in risk will affect your existing security strategy. View this expert resource now to gain best practices for cloud risk management and explore the importance of revisiting risk assumptions, pros and cons of aggregation, tips for pen testing cloud environments, and more.
-
Key software development trends to drive business success
By: TechTarget ComputerWeekly.com
Type: eGuide
In this e-guide, you will learn more about leveraging DevOps to automate processes between development and IT teams, the importance of testing to keep internet of things devices safe from prying eyes and how one company has made use of open source software to automate the roll-out of application changes.
-
A guide to continuous software delivery
By: TechTarget ComputerWeekly.com
Type: eBook
Software empowers business strategy. In this e-guide we explore how to deliver new software-powered functionality for continuous business improvement.
-
Enterprise Wi-Fi Stress Test: Cloud-Managed 802.11ax (Wi-Fi 6) Access Points
By: RUCKUS Networks
Type: Research Content
This report details the performance attributes of cloud-managed 802.11ax (Wi-Fi 6) access points (APs) in a high-density and high-capacity environment with a mix of video, VoIP and data traffic. The intent is to test cloud-managed enterprise AP performance under a real-world scenario that is relevant to most enterprise networks today.
-
Securing the entire software development pipeline with Veracode Static Analysis
By: Veracode
Type: White Paper
Developers need security testing solutions that can keep pace with rapid, agile development processes. Traditional AppSec solutions can cause development to stall and delay the release of software. In this guide, learn how static analysis solutions can secure applications without hindering fast development.
-
Buyer’s guide to evaluating SASE clouds
By: Netskope
Type: Analyst Report
Broadband-Testing is an independent testing operation which provides vendor-neutral evaluations of tech solutions. This report presents a scorecard for comparing SASE clouds and acts as a first step in the vendor evaluation process. Read on to learn more.
-
Application security: best practices and risks
By: TechTarget ComputerWeekly.com
Type: eGuide
Security professionals need to anticipate vulnerabilities from all the right perspectives, and that means testing apps for flaws on a regular basis, whether that means monthly, quarterly or following updates. Check out this e-guide, which include application security best practices, threat identification and security testing tips.
-
Independent analysis of Bitdefender GravityZone
By: Bitdefender
Type: White Paper
Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.
-
A thousand pen-testers, at your service
By: Pcysys
Type: Data Sheet
Traditionally, manual penetration testing is a costly and unreliable endeavor. However, modern automated penetration testing platforms enable organizations to better understand their unique vulnerabilities, allowing them to stay ahead of tomorrow’s threats – read this data sheet to learn more.
-
IAST fact vs. fiction: Debunking 5 common myths
By: Contrast Security
Type: Blog
While Interactive Application Security Testing (IAST) can help accelerate DevSecOps, some common misconceptions persist that can stymie even the most valiant of security testing efforts. This essential resource debunks 5 commonly-believed IAST myths.
-
Build and deploy quality ML models with AI observability
By: AWS & Intel
Type: Case Study
In this case study, you’ll discover how a leading bank was able to reliably speed up ML model testing, approval, and deployment by leveraging a comprehensive AI observability solution. Read on to learn how you can ensure model quality for your AI solutions by focusing on testing and monitoring throughout the software lifecycle.
-
SAST vs. IAST: Picking the Right Tool for the Job
By: Contrast Security
Type: Webcast
Watch this webinar for a demo of static application security testing (SAST) and interactive application security testing (IAST) solutions and determine which is the right tool for your needs.
-
Focus: Disaster recovery planning and virtualisation
By: TechTarget ComputerWeekly.com
Type: eGuide
We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.
-
CW ANZ, November 2018: Exploring blockchain
By: TechTarget ComputerWeekly.com
Type: Ezine
Blockchain technology has been in the news due to its ability to provide much better security, transparency and efficiency. In this issue of CW ANZ, we look at how enterprises in Australia and New Zealand are using blockchain technology to improve security and efficiency, and what it takes to spur greater adoption among ANZ enterprises.